Analysis
-
max time kernel
187s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 03:34
Static task
static1
Behavioral task
behavioral1
Sample
560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c.exe
Resource
win10v2004-20220414-en
General
-
Target
560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c.exe
-
Size
169KB
-
MD5
3fdd3f9ed517441aaab8b67eb40211f5
-
SHA1
e67303a8e18c7b45ca1b402d3d895785432fbd35
-
SHA256
560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c
-
SHA512
20f88ecf5b9e8c6ffbaba836ac5b7f5ff260be1ce7d2069c6d30b138d15f7875882e4e23f860ce783a4e2eb8b2d9cbd9fc120c209e15ab874a57e0f1095f15c2
Malware Config
Extracted
buer
https://gstatiknetiplist.cc/
https://gstatiknetiplist.com/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\RedTools\\networker.exe\"" networker.exe -
resource yara_rule behavioral2/memory/3680-131-0x0000000000030000-0x000000000003A000-memory.dmp buer behavioral2/memory/3680-132-0x0000000040000000-0x000000004049D000-memory.dmp buer behavioral2/memory/4332-137-0x0000000040000000-0x000000004049D000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 4332 networker.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: networker.exe File opened (read-only) \??\I: networker.exe File opened (read-only) \??\N: networker.exe File opened (read-only) \??\O: networker.exe File opened (read-only) \??\U: networker.exe File opened (read-only) \??\F: networker.exe File opened (read-only) \??\G: networker.exe File opened (read-only) \??\R: networker.exe File opened (read-only) \??\V: networker.exe File opened (read-only) \??\W: networker.exe File opened (read-only) \??\X: networker.exe File opened (read-only) \??\Z: networker.exe File opened (read-only) \??\A: networker.exe File opened (read-only) \??\J: networker.exe File opened (read-only) \??\L: networker.exe File opened (read-only) \??\M: networker.exe File opened (read-only) \??\Q: networker.exe File opened (read-only) \??\T: networker.exe File opened (read-only) \??\B: networker.exe File opened (read-only) \??\E: networker.exe File opened (read-only) \??\K: networker.exe File opened (read-only) \??\P: networker.exe File opened (read-only) \??\S: networker.exe File opened (read-only) \??\Y: networker.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2640 4668 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4332 networker.exe 4332 networker.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3680 wrote to memory of 4332 3680 560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c.exe 87 PID 3680 wrote to memory of 4332 3680 560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c.exe 87 PID 3680 wrote to memory of 4332 3680 560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c.exe 87 PID 4332 wrote to memory of 4668 4332 networker.exe 90 PID 4332 wrote to memory of 4668 4332 networker.exe 90 PID 4332 wrote to memory of 4668 4332 networker.exe 90 PID 4332 wrote to memory of 4668 4332 networker.exe 90 PID 4332 wrote to memory of 4668 4332 networker.exe 90 PID 4332 wrote to memory of 4668 4332 networker.exe 90 PID 4332 wrote to memory of 4668 4332 networker.exe 90 PID 4332 wrote to memory of 4668 4332 networker.exe 90 PID 4332 wrote to memory of 4668 4332 networker.exe 90 PID 4332 wrote to memory of 4668 4332 networker.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c.exe"C:\Users\Admin\AppData\Local\Temp\560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\ProgramData\RedTools\networker.exeC:\ProgramData\RedTools\networker.exe "C:\Users\Admin\AppData\Local\Temp\560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\RedTools\networker.exe3⤵PID:4668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 2204⤵
- Program crash
PID:2640
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4668 -ip 46681⤵PID:4776
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD53fdd3f9ed517441aaab8b67eb40211f5
SHA1e67303a8e18c7b45ca1b402d3d895785432fbd35
SHA256560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c
SHA51220f88ecf5b9e8c6ffbaba836ac5b7f5ff260be1ce7d2069c6d30b138d15f7875882e4e23f860ce783a4e2eb8b2d9cbd9fc120c209e15ab874a57e0f1095f15c2
-
Filesize
169KB
MD53fdd3f9ed517441aaab8b67eb40211f5
SHA1e67303a8e18c7b45ca1b402d3d895785432fbd35
SHA256560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c
SHA51220f88ecf5b9e8c6ffbaba836ac5b7f5ff260be1ce7d2069c6d30b138d15f7875882e4e23f860ce783a4e2eb8b2d9cbd9fc120c209e15ab874a57e0f1095f15c2